Sciweavers

139 search results - page 4 / 28
» Analyzing Empirical Data from a Reverse Engineering Project
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
CSMR
2005
IEEE
14 years 1 months ago
Maintenance and Analysis of Visual Programs -- An Industrial Case
A domain-specific visual language, Function Block Language (FBL), is used in Metso Automation for writing automation control programs. The same engineering environment is used for...
Mika Karaila, Tarja Systä
SIGSOFT
2004
ACM
14 years 8 months ago
Empirical evaluation of defect projection models for widely-deployed production software systems
Defect-occurrence projection is necessary for the development of methods to mitigate the risks of software defect occurrences. In this paper, we examine user-reported software def...
Paul Luo Li, Mary Shaw, James D. Herbsleb, Bonnie ...
ISESE
2005
IEEE
14 years 1 months ago
Dialog-based protocol: an empirical research method for cognitive activities in software engineering
This paper proposes dialog-based protocol for the study of the cognitive activities during software development and evolution. The dialog-based protocol, derived from the idea of ...
Shaochun Xu, Václav Rajlich